4.5 million sensitive patient data records have been exfiltrated by a Chinese hacker group, according to a report made on Monday by the US Securities and Exchange Commission. The data includes names, addresses, phone numbers, and Social Security Numbers, which might be sufficient information to initiate financial fraud on the patients affected.

Websense® Security Labs™ has tracked down an increasing number of malicious activities hitting hospitals during the last couple of months. The first spikes started as early as October 2013 and have been increasing ever since, leaving hospitals as primary targets for quite some time.

The majority of the attacks are delivered by the infamous Heartbleed vulnerability (CVE-2014-0160), which targets unpatched OpenSSL libraries used by the vast majority of Web services and clients (read more here).

In our reports we have also seen an increased number of Zeus Gameover malware infections and Command & Control server traffic. Zeus Gameover uses a Peer-to-Peer network to communicate with the Command and Control server (read more here).

Special thanks to Michael Swafford and team for the data visualization.

Zeus is a malware family that we encounter frequently, due to its popularity with cyber-criminal groups. Ever since the Zeus source code was leaked in 2011, there have been many new variants. One such variant is dubbed ‘GameOver’, which recently made a mark in the media after its infrastructure was seized by authorities.

Update: Do you have 3 minutes? See how Zeus Gameover steals your data in our new video. Better still; find out how to protect.

(Please visit the site to view this media)

Update 2 [July 14 , 2014]: As we expected to see, Zeus GameOver has returned and evolved. The new variant has replaced the old peer-to-peer networking in favour of a Fast-Flux based infrastructure. In addition, the new domain generation algorithm (DGA) now generates domains using digits as well as letters, but no longer uses the .info or .ru TLDs. Websense customers continue to be protected from this threat at the same stages of the threat lifecycle as listed at the foot of this blog.

Background & Information

Zeus GameOver was first seen in 2011 and is very similar to the original Zeus malware. Its main use is for Crimeware purposes, such as seeking financial gain by stealing credentials and even transferring funds from victims accounts. We have also seen GameOver subsequently download malware such as Cryptolocker.

There is an important difference between GameOver and other Zeus variants, though. In a typical Zeus (or Zbot) malware, a central Command and Control (C&C) point is used to send out data and receive commands. In GameOver, however, the infrastructure is decentralized and instead relies on peer-to-peer (P2P) technology for its C&C capabilities.

This change in C&C infrastructure has become a big challenge for the security industry, because there is no single point of failure, such as the ability to take down a single command and control node. The Websense® ThreatSeeker® Intelligence Cloud is actively aware of this network and defends against it across the majority of the 7 stages of advanced threats model.

It's very important to note that Zeus GameOver is not directly sent to a potential victim. Instead, a downloader is involved in the initial infection, such as Pony Loader, and more recently, Upatre. Historically, the attack vectors have been mostly emails, usually sent by the Cutwail spam botnet. In the past, a mix of direct attachments, as well as URLs leading to exploit kits, would drop downloaders onto a victim's computer. More recently, with Upatre gaining momentum due to its ability to evade AV detection, the focus has been mostly on attachments, but in the past few weeks we have seen email lures containing URLs using sites such as Dropbox to serve Zip files containing Upatre. What's particularly nasty about Upatre is that it downloads Zeus GameOver in an encrypted form that bypasses most firewall and intrusion prevention system file-type detection. Another artifact that often gets bundled is the Necrus rootkit trojan, which helps to keep the infection persistent.

Campaign

In the last two months we have seen increasing activity in the GameOver malware downloads via Upatre, with the last week being particularly active. The next table shows the top 10 affected countries we have seen affected by Zeus GameOver. While the United States has been the most targeted country of this campaign, the threat has moved toward a wider global reach recently.

United States

48.793%

United Kingdom

6.752%

Italy

4.980%

Malaysia

3.043%

Canada

2.586%

Mexico

1.527%

Jordan

1.309%

Turkey

1.307%

Costa Rica

1.084%

New Caledonia

1.068%

Table 1: Top 10 affected countries by Zeus GameOver

The next heatmap video shows how dominant the GameOver variant has been in April and May of this year.

(Please visit the site to view this media)

Interestingly (and you might say very much expected), the main target of Zeus GameOver campaigns has been the financial industry, with a trend towards targeting victims at companies in the pension management sector of the financial industry. The next table shows the top 5 industries that Zeus GameOver targets:

Retirement & Pension Management

36.036%

Education

27.59%

Services

7.536%

Manufacturing

6.715%

Finance, Insurance & Real Estate

5.901%

Table 2: Top 5 affected industries by Zeus GameOver

Case Study

Here's a recent example of an email attack stopped by Websense Cloud Email Security (CES). The attack tried to entice victims to open a ZIP attachment containing the Upatre downloader on their computer, which would later infect the users with Zeus GameOver.

Stage 4 (Exploit Kit) – ACE has detection for the malicious code that attempts to execute this cyber-attack. This stage may or may not exist, lately exploit kits have fallen out of favor with the criminals behind Zeus GameOver.

Summary

GameOver has been around for several years, and since its inception has been a challenge for the security industry to defend against, because different variants have appeared, and also because its source code was leaked. Websense researchers recommend utilizing a strong email security product, which will proactively block campaigns and prevent infection from GameOver from ever happening. The Websense® ThreatSeeker® Intelligence Cloud has seen a notable increase in its activity over the last two months leading up to the takedown of GameOver, and continue to monitor closely.